CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-1999-0636 | The discard service is running. | [] |
CVE-1999-0637 | The systat service is running. | [] |
CVE-1999-0638 | The daytime service is running. | [] |
CVE-1999-0639 | The chargen service is running. | [] |
CVE-1999-0640 | The Gopher service is running. | [] |
CVE-1999-0641 | The UUCP service is running. | [] |
CVE-1999-0650 | The netstat service is running, which provides sensitive information to remote attackers. | ['sensitive information'] |
CVE-1999-0651 | The rsh/rlogin service is running. | [] |
CVE-1999-0653 | A component service related to NIS+ is running. | [] |
CVE-1999-0654 | The OS/2 or POSIX subsystem in NT is enabled. | [] |
CVE-1999-0656 | The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names. | ['specifying arbitrary UIDs', 'enumerate valid usernames by specifying arbitrary UIDs that', 'ugidd rpc interface'] |
CVE-1999-0657 | WinGate is being used. | [] |
CVE-1999-0661 | A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6. | [] |
CVE-1999-0662 | A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete. | [] |
CVE-1999-0663 | A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified. | ['integrity'] |
CVE-1999-0664 | An application-critical Windows NT registry key has inappropriate permissions. | ['inappropriate permissions'] |
CVE-1999-0665 | An application-critical Windows NT registry key has an inappropriate value. | ['inappropriate value'] |
CVE-1999-0667 | The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service. | ['spoof ARP replies and poison the ARP cache', 'denial of service', 'spoofing'] |
CVE-1999-0668 | The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | ['execute arbitrary commands', 'execute arbitrary commands as demonstrated by Bubbleboy'] |
CVE-1999-0669 | The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | ['execute arbitrary commands', 'execute arbitrary commands as demonstrated by Bubbleboy'] |
CVE-1999-0670 | Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands. | ['execute arbitrary commands', 'buffer overflow'] |
CVE-1999-0671 | Buffer overflow in ToxSoft NextFTP client through CWD command. | ['buffer overflow'] |
CVE-1999-0672 | Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics. | ['buffer overflow'] |
CVE-1999-0673 | Buffer overflow in ALMail32 POP3 client via From: or To: headers. | ['buffer overflow'] |
CVE-1999-0674 | The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. | ['modify the internal data space of a program'] |
CVE-1999-0675 | Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host. | ['denial of service'] |
CVE-1999-0676 | sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. | ['overwrite sensitive files via a symlink attack', 'sdtcm_convert'] |
CVE-1999-0677 | The WebRamp web administration utility has a default password. | ['default password'] |
CVE-1999-0678 | A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server. | ['read documentation files for the entire server'] |
CVE-1999-0679 | Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option. | ['execute commands via m_invite invite option', 'buffer overflow'] |
CVE-1999-0680 | Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service. | ['for a denial of service'] |
CVE-1999-0681 | Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL. | ['cause a denial of service via a long', 'buffer overflow'] |
CVE-1999-0682 | Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled. | ['relay email (i.e. spam) using encapsulated', 'encapsulated smtp addresses'] |
CVE-1999-0683 | Denial of service in Gauntlet Firewall via a malformed ICMP packet. | ['denial of service', 'malformed icmp packet'] |
CVE-1999-0684 | Denial of service in Sendmail 8.8.6 in HPUX. | ['denial of service'] |
CVE-1999-0685 | Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option. | ['buffer overflow'] |
CVE-1999-0686 | Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL. | ['denial of service', 'long url'] |
CVE-1999-0687 | The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. | ['execute commands', 'weak rpc authentication'] |
CVE-1999-0688 | Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x. | ['buffer overflows'] |
CVE-1999-0689 | The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. | ['execute arbitrary commands', 'execute arbitrary commands via a symlink attack'] |
CVE-1999-0690 | HP CDE program includes the current directory in root's PATH variable. | [] |
CVE-1999-0691 | Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. | ['gain root privileges', 'gain root privileges via a long user name', 'buffer overflow'] |
CVE-1999-0692 | The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges. | ['gain root privileges'] |
CVE-1999-0693 | Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges. | ['gain root privileges', 'buffer overflow'] |
CVE-1999-0694 | Denial of service in AIX ptrace system call allows local users to crash the system. | ['crash the system', 'denial of service', 'crash system'] |
CVE-1999-0695 | The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack. | ['read arbitrary files', 'read arbitrary files through a .. (dot', 'dot dot attack'] |
CVE-1999-0696 | Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). | ['buffer overflow'] |
CVE-1999-0697 | SCO Doctor allows local users to gain root privileges through a Tools option. | ['gain root privileges', 'gain root privileges through a Tools option'] |
CVE-1999-0698 | Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux. | ['denial of service'] |
CVE-1999-0699 | The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs. | ['session hijacking via easily guessable session IDs', 'guessable session ids'] |
CVE-1999-0700 | Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file. | ['buffer overflow'] |
CVE-1999-0701 | After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. | ['sensitive information'] |
CVE-1999-0702 | Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability. | ['modify or execute files via the Import/', 'importexportfavorites'] |
CVE-1999-0703 | OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices. | ['set chflags and fchflags on character and block'] |
CVE-1999-0704 | Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. | ['buffer overflow'] |
CVE-1999-0705 | Buffer overflow in INN inews program. | ['buffer overflow'] |
CVE-1999-0706 | Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables. | ['gain root privileges', 'gain root privileges by modifying the IFS or'] |
CVE-1999-0707 | The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization. | ['send a file to other participants without authorization', 'ftp configuration'] |
CVE-1999-0708 | Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field. | ['gain root privileges', 'gain root privileges via a long GECOS field', 'buffer overflow'] |
CVE-1999-0710 | The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. | ['use it as an intermediary to connect to', 'public web directory'] |
CVE-1999-0711 | The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root. | ['execute Tcl commands as root'] |
CVE-1999-0712 | A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable. | ['be made world-readable'] |
CVE-1999-0713 | The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges. | ['gain root privileges'] |
CVE-1999-0714 | Vulnerability in Compaq Tru64 UNIX edauth command. | [] |
CVE-1999-0715 | Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry. | ['execute commands or cause a denial of service', 'buffer overflow'] |
CVE-1999-0716 | Buffer overflow in Windows NT 4.0 help file utility via a malformed help file. | ['buffer overflow'] |
CVE-1999-0717 | A remote attacker can disable the virus warning mechanism in Microsoft Excel 97. | ['virus warning mechanism'] |
CVE-1999-0718 | IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key. | ['gain administrator privileges', 'gain administrator privileges by changing the GroupMapping registry'] |
CVE-1999-0719 | The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code. | ['execute arbitrary code'] |
CVE-1999-0720 | The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users. | ['modify TTY terminal devices that belong to other'] |
CVE-1999-0721 | Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request. | ['denial of service', 'malformed lsa request'] |
CVE-1999-0722 | The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages. | ['install arbitrary software packages'] |
CVE-1999-0723 | The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input. | ['denial of service'] |
CVE-1999-0724 | Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function. | ['buffer overflow'] |
CVE-1999-0725 | When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page". | ['view the source code of certain files', 'double byte code page'] |
CVE-1999-0726 | An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header. | ['denial of service', 'malformed file image header'] |
CVE-1999-0727 | A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted. | ['be sent unencrypted', 'kernel leak'] |
CVE-1999-0728 | A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them. | [] |
CVE-1999-0729 | Buffer overflow in Lotus Notes LDAP (NLDAP) allows an attacker to conduct a denial of service through the ldap_search request. | ['conduct a denial of service through the ldap_search', 'buffer overflow'] |
CVE-1999-0730 | The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack. | ['overwrite files via a symlink attack'] |
CVE-1999-0731 | The KDE klock program allows local users to unlock a session using malformed input. | ['unlock a session using malformed input'] |
CVE-1999-0732 | The logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files using symbolic links. | ['delete arbitrary files', 'delete arbitrary files using symbolic links'] |
CVE-1999-0733 | Buffer overflow in VMWare 1.0.1 for Linux via a long HOME environmental variable. | ['buffer overflow'] |
CVE-1999-0734 | A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication. | ['modify the server database without authentication'] |
CVE-1999-0735 | KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories. | ['gain privileges', 'gain privileges via a symlink attack in temporary'] |
CVE-1999-0736 | The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. | ['read arbitrary files'] |
CVE-1999-0737 | The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. | ['read arbitrary files'] |
CVE-1999-0738 | The code.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. | ['read arbitrary files'] |
CVE-1999-0739 | The codebrws.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. | ['read arbitrary files'] |
CVE-1999-0740 | Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable. | ['denial of service', 'malformed term environmental variable'] |
CVE-1999-0741 | QMS CrownNet Unix Utilities for 2060 allows root to log on without a password. | ['log on without a password'] |
CVE-1999-0742 | The Debian mailman package uses weak authentication, which allows attackers to gain privileges. | ['gain privileges', 'weak authentication'] |
CVE-1999-0743 | Trn allows local users to overwrite other users' files via symlinks. | ["overwrite other users' files via symlinks"] |
CVE-1999-0744 | Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request. | ['gain privileges', 'gain privileges via a long HTTP GET request', 'buffer overflow'] |
CVE-1999-0745 | Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler. | ['buffer overflow'] |
CVE-1999-0746 | A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service. | ['conduct a denial of service'] |
CVE-1999-0747 | Denial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load. | ['denial of service'] |
CVE-1999-0748 | Buffer overflows in Red Hat net-tools package. | ['buffer overflows'] |
CVE-1999-0749 | Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument. | ['buffer overflow'] |
CVE-1999-0750 | Hotmail allows Javascript to be executed via the HTML STYLE tag, allowing remote attackers to execute commands on the user's Hotmail account. | ['be executed via the HTML STYLE tag', "execute commands on the user's Hotmail account"] |
Subsets and Splits